Search results for: negative and positive artificial charged aerosol cloud
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11790

Search results for: negative and positive artificial charged aerosol cloud

11640 An Investigation of Influential Factors in Adopting the Cloud Computing in Saudi Arabia: An Application of Technology Acceptance Model

Authors: Shayem Saleh ALresheedi, Lu Song Feng, Abdulaziz Abdulwahab M. Fatani

Abstract:

Cloud computing is an emerging concept in the technological sphere. Its development enables many applications to avail information online and on demand. It is becoming an essential element for businesses due to its ability to diminish the costs of IT infrastructure and is being adopted in Saudi Arabia. However, there exist many factors that affect its adoption. Several researchers in the field have ignored the study of the TAM model for identifying the relevant factors and their impact for adopting of cloud computing. This study focuses on evaluating the acceptability of cloud computing and analyzing its impacting factors using Technology Acceptance Model (TAM) of technology adoption in Saudi Arabia. It suggests a model to examine the influential factors of the TAM model along with external factors of technical support in adapting the cloud computing. The proposed model has been tested through the use of multiple hypotheses based on calculation tools and collected data from customers through questionnaires. The findings of the study prove that the TAM model along with external factors can be applied in measuring the expected adoption of cloud computing. The study presents an investigation of influential factors and further recommendation in adopting cloud computing in Saudi Arabia.

Keywords: cloud computing, acceptability, adoption, determinants

Procedia PDF Downloads 166
11639 Installing Cloud Computing Model for E-Businesses in Small Organizations

Authors: Khader Titi

Abstract:

Information technology developments have changed the way how businesses are working. Organizations are required to become visible online and stay connected to take advantages of costs reduction and improved operation of existing resources. The approval and the application areas of the cloud computing has significantly increased since it was presented by Google in 2007. Internet Cloud computing has attracted the IT enterprise attention especially the e-business enterprise. At this time, there is a great issue of environmental costs during the enterprises apply the e- business, but with the coming of cloud computing, most of the problem will be solved. Organizations around the world are facing with the continued budget challenges and increasing in the size of their computational data so, they need to find a way to deliver their services to clients as economically as possible without negotiating the achievement of anticipated outcomes. E- business companies need to provide better services to satisfy their clients. In this research, the researcher proposed a paradigm that use and deploy cloud computing technology environment to be used for e-business in small enterprises. Cloud computing might be a suitable model for implementing e-business and e-commerce architecture to improve efficiency and user satisfaction.

Keywords: E-commerce, cloud computing, B2C, SaaS

Procedia PDF Downloads 288
11638 Voltage Polarity in Electrospinning: Way to Control Surface Properties of Polymer Fibers

Authors: Urszula Stachewicz

Abstract:

Surface properties of materials are the key parameter in many applications, especially in the biomedical field, to control cell-material interactions. In our work, we want to achieve the controllability of surface properties of polymer fibers via a single-step electrospinning process by alternating voltage polarities. Voltage polarity defines the charge accumulated on the surface of the liquid jet and the surface of the fibers. Positive polarity attracts negatively charged groups to fibers’ surface, whereas negative polarity moves the negatively charged functional groups away from the surface. This way, we can control the surface chemistry, wettability, and additionally surface potential of electrospun fibers. Within our research, we characterized surface chemistry using X-ray photoelectron microscopy (XPS) and surface potential with Kelvin probe force microscopy (KPFM) on electrospun fibers of commonly used polymers such as PCL, PVDF, and PMMA, often used as biomaterials. We proved the significant effect of fibers' surface potential on cell integration with the scaffolds and further cells development for the regeneration processes based on the osteoblast and fibroblast culture studies. Acknowledgments: The study was conducted within ‘Nanofiber-based sponges for atopic skin treatment’ project, which is carried out within the First TEAM programme of the Foundation for Polish Science co-financed by the European Union under the European Regional Development Fund, project no POIR.04.04.00-00- 4571/18-00.

Keywords: cell attachment, fibers, fibroblasts, osteoblast, proliferation, surface potential

Procedia PDF Downloads 85
11637 Effects of Recognition of Customer Feedback on Relationships between Emotional Labor and Job Satisfaction: Focusing On Call Centers That Offer Professional Services

Authors: Kiyoko Yoshimura, Yasunobu Kino

Abstract:

Focusing on professional call centers where workers with expertise perform services, this study aims to clarify the relationships between emotional labor and job satisfaction and the effects of recognition of customer feedback. Since the professional call center operators consist of professional license holders (qualification holders) and those who do not (non-holders), the following three points are analyzed in the two groups by using covariance structure analysis and simultaneous multi-population analysis: 1) The relationship between emotional labor and job satisfaction, 2) customer feedback and job satisfaction, and 3) The intermediation effect between the emotional labor of customer feedback and job satisfaction. The following results are obtained: i) no direct effect is found between job satisfaction and emotional labor for qualification holders and non-holders, ii) for qualification holders and non-holders, recognition of positive feedback and recognition of negative feedback had positive and negative effects on job satisfaction, respectively, iii) for qualification and non-holders, "consideration for colleagues" influences job satisfaction by recognizing positive feedback, and iv) only for qualification holders, the factors "customer-oriented emotional expression" and "emotional disharmony" have a positive and negative effect on job satisfaction, respectively, through recognition of positive feedback and recognition of negative feedback.

Keywords: call center, emotional labor, professional service, job satisfaction, customer feedback

Procedia PDF Downloads 65
11636 New Security Approach of Confidential Resources in Hybrid Clouds

Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel

Abstract:

Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.

Keywords: cloud, confidentiality, cryptography, security issues, trust issues

Procedia PDF Downloads 344
11635 The Association between Affective States and Sexual/Health-Related Status among Men Who Have Sex with Men in China: An Exploration Study Using Social Media Data

Authors: Zhi-Wei Zheng, Zhong-Qi Liu, Jia-Ling Qiu, Shan-Qing Guo, Zhong-Wei Jia, Chun Hao

Abstract:

Objectives: The purpose of this study was to understand and examine the association between diurnal mood variation and sexual/health-related status among men who have sex with men (MSM) using data from MSM Chinese Twitter messages. The study consists of 843,745 postings of 377,610 MSM users located in Guangdong that were culled from the MSM Chinese Twitter App. Positive affect, negative affect, sexual related behaviors, and health-related status were measured using the Simplified Chinese Linguistic Inquiry and Word Count. Emotions, including joy, sadness, anger, fear, and disgust were measured using the Weibo Basic Mood Lexicon. A positive sentiment score and a positive emotions score were also calculated. Linear regression models based on a permutation test were used to assess associations between affective states and sexual/health-related status. In the results, 5,871 active MSM users and their 477,374 postings were finally selected. MSM expressed positive affect and joy at 8 a.m. and expressed negative affect and negative emotions between 2 a.m. and 4 a.m. In addition, 25.1% of negative postings were directly related to health and 13.4% reported seeking social support during that sensitive period. MSM who were senior, educated, overweight or obese, self-identified as performing a versatile sex role, and with less followers, more followers, and less chat groups mainly expressed more negative affect and negative emotions. MSM who talked more about sexual-related behaviors had a higher positive sentiment score (β=0.29, p < 0.001) and a higher positive emotions score (β = 0.16, p < 0.001). MSM who reported more on their health status had a lower positive sentiment score (β = -0.83, p < 0.001) and a lower positive emotions score (β = -0.37, p < 0.001). The study concluded that psychological intervention based on an app for MSM should be conducted, as it may improve mental health.

Keywords: affect, men who have sex with men, sexual related behavior, health-related status, social media

Procedia PDF Downloads 136
11634 Antibacterial Activity of Calendula officinalis Extract Loaded Chitosan Nanoparticles

Authors: Sanjay Singh, Swati Jaiswal, Prashant Mishra

Abstract:

Nanoparticle based formulations of drug delivery systems have shown their potential in improving the performance of existing drugs and have opened avenues for new therapies. Calendula extract is a low cost, wide spectrum bioactive material that has been used for a long term therapy of various infections. Aim: The aim of this study was to develop Calendula officinalis extract based nanoformulations and to study the antibacterial activity of either Calendula extract loaded chitosan nanoparticles or Calendula extract coated silver nanoparticles for increased bioavailability and their long term effect. Methods: Chitosan nanoparticles were prepared by the process of ionotropic gelation, based on interaction between the negative groups of tri polyphosphate (TPP) and positively charged amino groups of chitosan. The size of the Calendula extract-loaded chitosan particles was determined using dynamic light scattering and scanning electron microscopy. Antibacterial activities of these formulations were determined based on minimum inhibitory concentration and time kill studies. In addition, silver nanoparticles were also synthesized in the presence of Calendula extract and characterized by UV visible spectrum, DLS and XRD. Experiments were conducted on 96-plates against two Gram-positive bacteria; Staphylococcus aureus and Bacillus subtilis two Gram-negative bacteria; Escherichia coli and Pseudomonas aeruginosa. Results: Results demonstrated time dependent antibacterial activity against different microbes studied. Both Calendula extract and Calendula extract loaded chitosan nanoparticles have shown good antimicrobial activity against both Gram positive and Gram negative bacteria. Conclusion: Calendula extract loaded chitosan nanoparticles and calendula extract coated silver nanoparticles are potential antibacterial for their long term antibacterial effects.

Keywords: antibacterial, Calendula extract, chitosan nanoparticles, silver nanoparticles

Procedia PDF Downloads 318
11633 Structural Analysis of Multi-Pressure Integrated Vessel for Sport-Multi-Artificial Environment System

Authors: Joon-Ho Lee, Jeong-Hwan Yoon, Jung-Hwan Yoon, Sangmo Kang, Su-Yeon Hong, Hyun-Woo Jeong, Jaeick Chae

Abstract:

There are several dedicated individual chambers for sports that are supplied and used, but none of them are multi-pressured all-in-one chambers that can provide a sports multi-environment simultaneously. In this study, we design a multi-pressure (positive/atmospheric/negative pressure) integrated vessel that can be used for the sport-multi-artificial environment system. We presented additional vessel designs with enlarged space for the tall users; with reinforcement pads added to reduce the maximum stress in the joints of its shells, and then carried out numerical analysis for the structural analysis with maximum stress and structural safety. Under the targeted allowable pressure conditions, maximum stresses occurred at the joint of the shell, and the entrance, the safety of the structure was checked with the allowable stress of its material.

Keywords: structural analysis, multi-pressure, integrated vessel, sport-multi-artificial environment

Procedia PDF Downloads 498
11632 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 364
11631 Multi-Criteria Evaluation of IDS Architectures in Cloud Computing

Authors: Elmahdi Khalil, Saad Enniari, Mostapha Zbakh

Abstract:

Cloud computing promises to increase innovation and the velocity with witch applications are deployed, all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantages of those opportunities while minimizing risks, we think that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed by a well-known researcher named Anderson in 1980's. Since that time IDS's are evolving. Although, several efforts has been made in the area of Intrusion Detection systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi criteria analysis and a comparative study between several IDS architectures designated to work in a cloud computing environments. To achieve this objective, in the first place we will search in the state of the art of several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi criteria decision analysis Mac Beth (Measuring Attractiveness by a Categorical Based Evaluation Technique we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.

Keywords: cloud computing, cloud security, intrusion detection/prevention system, multi-criteria decision analysis

Procedia PDF Downloads 443
11630 Modification of a Commercial Ultrafiltration Membrane by Electrospray Deposition for Performance Adjustment

Authors: Elizaveta Korzhova, Sebastien Deon, Patrick Fievet, Dmitry Lopatin, Oleg Baranov

Abstract:

Filtration with nanoporous ultrafiltration membranes is an attractive option to remove ionic pollutants from contaminated effluents. Unfortunately, commercial membranes are not necessarily suitable for specific applications, and their modification by polymer deposition is a fruitful way to adapt their performances accordingly. Many methods are usually used for surface modification, but a novel technique based on electrospray is proposed here. Various quantities of polymers were deposited on a commercial membrane, and the impact of the deposit is investigated on filtration performances and discussed in terms of charge and hydrophobicity. The electrospray deposition is a technique which has not been used for membrane modification up to now. It consists of spraying small drops of polymer solution under a high voltage between the needle containing the solution and the metallic support on which membrane is stuck. The advantage of this process lies in the small quantities of polymer that can be coated on the membrane surface compared with immersion technique. In this study, various quantities (from 2 to 40 μL/cm²) of solutions containing two charged polymers (13 mmol/L of monomer unit), namely polyethyleneimine (PEI) and polystyrene sulfonate (PSS), were sprayed on a negatively charged polyethersulfone membrane (PLEIADE, Orelis Environment). The efficacy of the polymer deposition was then investigated by estimating ion rejection, permeation flux, zeta-potential and contact angle before and after the polymer deposition. Firstly, contact angle (θ) measurements show that the surface hydrophilicity is notably improved by coating both PEI and PSS. Moreover, it was highlighted that the contact angle decreases monotonously with the amount of sprayed solution. Additionally, hydrophilicity enhancement was proved to be better with PSS (from 62 to 35°) than PEI (from 62 to 53°). Values of zeta-potential (ζ were estimated by measuring the streaming current generated by a pressure difference on both sides of a channel made by clamping two membranes. The ζ-values demonstrate that the deposits of PSS (negative at pH=5.5) allow an increase of the negative membrane charge, whereas the deposits of PEI (positive) lead to a positive surface charge. Zeta-potentials measurements also emphasize that the sprayed quantity has little impact on the membrane charge, except for very low quantities (2 μL/m²). The cross-flow filtration of salt solutions containing mono and divalent ions demonstrate that polymer deposition allows a strong enhancement of ion rejection. For instance, it is shown that rejection of a salt containing a divalent cation can be increased from 1 to 20 % and even to 35% by deposing 2 and 4 μL/cm² of PEI solution, respectively. This observation is coherent with the reversal of the membrane charge induced by PEI deposition. Similarly, the increase of negative charge induced by PSS deposition leads to an increase of NaCl rejection from 5 to 45 % due to electrostatic repulsion of the Cl- ion by the negative surface charge. Finally, a notable fall in the permeation flux due to the polymer layer coated at the surface was observed and the best polymer concentration in the sprayed solution remains to be determined to optimize performances.

Keywords: ultrafiltration, electrospray deposition, ion rejection, permeation flux, zeta-potential, hydrophobicity

Procedia PDF Downloads 159
11629 Cloud Design for Storing Large Amount of Data

Authors: M. Strémy, P. Závacký, P. Cuninka, M. Juhás

Abstract:

Main goal of this paper is to introduce our design of private cloud for storing large amount of data, especially pictures, and to provide good technological backend for data analysis based on parallel processing and business intelligence. We have tested hypervisors, cloud management tools, storage for storing all data and Hadoop to provide data analysis on unstructured data. Providing high availability, virtual network management, logical separation of projects and also rapid deployment of physical servers to our environment was also needed.

Keywords: cloud, glusterfs, hadoop, juju, kvm, maas, openstack, virtualization

Procedia PDF Downloads 328
11628 A Comparative Study on the Positive and Negative of Electronic Word-of-Mouth on the SERVQUAL Scale-Take A Certain Armed Forces General Hospital in Taiwan As An Example

Authors: Po-Chun Lee, Li-Lin Liang, Ching-Yuan Huang

Abstract:

Purpose: Research on electronic word-of-mouth (eWOM)& online review has been widely used in service industry management research in recent years. The SERVQUAL scale is the most commonly used method to measure service quality. Therefore, the purpose of this research is to combine electronic word of mouth & online review with the SERVQUAL scale. To explore the comparative study of positive and negative electronic word-of-mouth reviews of a certain armed force general hospital in Taiwan. Data sources: This research obtained online word-of-mouth comment data on google maps from a military hospital in Taiwan in the past ten years through Internet data mining technology. Research methods: This study uses the semantic content analysis method to classify word-of-mouth reviews according to the revised PZB SERVQUAL scale. Then carry out statistical analysis. Results of data synthesis: The results of this study disclosed that the negative reviews of this military hospital in Taiwan have been increasing year by year. Under the COVID-19 epidemic, positive word-of-mouth has a downward trend. Among the five determiners of SERVQUAL of PZB, positive word-of-mouth reviews performed best in “Assurance,” with a positive review rate of 58.89%, Followed by 43.33% of “Responsiveness.” In negative word-of-mouth reviews, “Assurance” performed the worst, with a positive rate of 70.99%, followed by responsive 29.01%. Conclusions: The important conclusions of this study disclosed that the total number of electronic word-of-mouth reviews of the military hospital has revealed positive growth in recent years, and the positive word-of-mouth growth has revealed negative growth after the epidemic of COVID-19, while the negative word-of-mouth has grown substantially. Regardless of the positive and negative comments, what patients care most about is “Assurance” of the professional attitude and skills of the medical staff, which needs to be strengthened most urgently. In addition, good “Reliability” will help build positive word-of-mouth. However, poor “Responsiveness” can easily lead to the spread of negative word-of-mouth. This study suggests that the hospital should focus on these few service-oriented quality management and audits.

Keywords: quality of medical service, electronic word-of-mouth, armed forces general hospital

Procedia PDF Downloads 150
11627 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment

Authors: Manas Tripathi, Arunabha Mukhopadhyay

Abstract:

In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.

Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security

Procedia PDF Downloads 255
11626 Artificial Intelligence Created Inventions

Authors: John Goodhue, Xiaonan Wei

Abstract:

Current legal decisions and policies regarding the naming as artificial intelligence as inventor are reviewed with emphasis on the recent decisions by the European Patent Office regarding the DABUS inventions holding that an artificial intelligence machine cannot be an inventor. Next, a set of hypotheticals is introduced and examined to better understand how artificial intelligence might be used to create or assist in creating new inventions and how application of existing or proposed changes in the law would affect the ability to protect these inventions including due to restrictions on artificial intelligence for being named as inventors, ownership of inventions made by artificial intelligence, and the effects on legal standards for inventiveness or obviousness.

Keywords: Artificial intelligence, innovation, invention, patent

Procedia PDF Downloads 138
11625 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems

Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi

Abstract:

The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.

Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks

Procedia PDF Downloads 328
11624 Artificial Intelligent-Based Approaches for Task ‎Offloading, ‎Resource ‎Allocation and Service ‎Placement of ‎Internet of Things ‎Applications: State of the Art

Authors: Fatima Z. Cherhabil, Mammar Sedrati, Sonia-Sabrina Bendib‎

Abstract:

In order to support the continued growth, critical latency of ‎IoT ‎applications, and ‎various obstacles of traditional data centers, ‎mobile edge ‎computing (MEC) has ‎emerged as a promising solution that extends cloud data-processing and decision-making to edge devices. ‎By adopting a MEC structure, IoT applications could be executed ‎locally, on ‎an edge server, different fog nodes, or distant cloud ‎data centers. However, we are ‎often ‎faced with wanting to optimize conflicting criteria such as ‎minimizing energy ‎consumption of limited local capabilities (in terms of CPU, RAM, storage, bandwidth) of mobile edge ‎devices and trying to ‎keep ‎high performance (reducing ‎response time, increasing throughput and service availability) ‎at the same ‎time‎. Achieving one goal may affect the other, making task offloading (TO), ‎resource allocation (RA), and service placement (SP) complex ‎processes. ‎It is a nontrivial multi-objective optimization ‎problem ‎to study the trade-off between conflicting criteria. ‎The paper provides a survey on different TO, SP, and RA recent multi-‎objective optimization (MOO) approaches used in edge computing environments, particularly artificial intelligent (AI) ones, to satisfy various objectives, constraints, and dynamic conditions related to IoT applications‎.

Keywords: mobile edge computing, multi-objective optimization, artificial ‎intelligence ‎approaches, task offloading, resource allocation, ‎ service placement

Procedia PDF Downloads 84
11623 Measuring the Cavitation Cloud by Electrical Impedance Tomography

Authors: Michal Malik, Jiri Primas, Darina Jasikova, Michal Kotek, Vaclav Kopecky

Abstract:

This paper is a case study dealing with the viability of using Electrical Impedance Tomography for measuring cavitation clouds in a pipe setup. The authors used a simple passive cavitation generator to cause a cavitation cloud, which was then recorded for multiple flow rates using electrodes in two measuring planes. The paper presents the results of the experiment, showing the used industrial grade tomography system ITS p2+ is able to measure the cavitation cloud and may be particularly useful for identifying the inception of cavitation in setups where other measuring tools may not be viable.

Keywords: cavitation cloud, conductivity measurement, electrical impedance tomography, mechanically induced cavitation

Procedia PDF Downloads 220
11622 Spectrum of Causative Pathogens and Resistance Rates to Antibacterial Agents in Bacterial Prostatitis

Authors: kamran Bhatti

Abstract:

Objective: To evaluate spectrum and resistance rates to antibacterial agents in causative pathogens of bacterial prostatitis in patients from Southern Europe, the Middle East, and Africa. Materials: 1027 isolates from cultures of urine or expressed prostatic secretion, post-massage urine or seminal fluid, or urethral samples were considered. Results: Escherichia coli (32%) and Enterococcus spp. (21%) were the most common isolates. Other Gram-negative, Gram-positive, and atypical pathogens accounted for 22%, 20%, and 5%, respectively. Resistance was <15% for piperacillin/tazobactam and carbapenems (both Gram-negative and -positive pathogens); <5% for glycopeptides against Gram-positive; 7%, 14%, and 20% for aminoglycosides, fosfomycin, and macrolides against Gram-negative pathogens, respectively; 10% for amoxicillin/clavulanate against Gram-positive pathogens; <20% for cephalosporins and fluoroquinolones against to Gram-negative pathogens (higher against Gram-positive pathogens); none for macrolides against atypical pathogens, but 20% and 27% for fluoroquinolones and tetracyclines. In West Africa, the resistance rates were generally higher, although the highest rates for ampicillin, cephalosporins, and fluoroquinolones were observed in the Gulf area. Lower rates were observed in Southeastern Europe. Conclusions: Resistance to antibiotics is a health problem requiring local health authorities to combat this phenomenon. Knowledge of the spectrum of pathogens and antibiotic resistance rates is crucial to assess local guidelines for the treatment of prostatitis.

Keywords: enterobacteriacae; escherichia coli, gram-positive pathogens, antibiotic, bacterial prostatitis, resistance

Procedia PDF Downloads 35
11621 Sustainable Ionized Gas Thermoelectric Generator: Comparative Theoretical Evaluation and Efficiency Estimation

Authors: Mohammad Bqoor, Mohammad Hamdan, Isam Janajreh, Sufian Abedrabbo

Abstract:

This extensive theoretical study on a novel Ionized Gas Thermoelectric Generator (IG-TEG) system has shown the ability of continuous energy extracting from the thermal energy of ambient air around standard room temperature and even below. This system does not need a temperature gradient in order to work, unlike the other TEGs that use the Seebeck effect, and therefore this new system can be utilized in sustainable energy systems, as well as in green cooling solutions, by extracting energy instead of wasting energy in compressing the gas for cooling. This novel system was designed based on Static Ratchet Potential (SRP), which is known as a spatially asymmetric electric potential produced by an array of positive and negative electrodes. The ratchet potential produces an electrical current from the random Brownian Motion of charged particles that are driven by thermal energy. The key parameter of the system is particle transportation, and it was studied under the condition of flashing ratchet potentials utilizing several methods and examined experimentally, ensuring its functionality. In this study, a different approach is pursued to estimate particle transportation by evaluating the charged particle distribution and applying the other conditions of the SRP, and showing continued energy harvesting potency from the particles’ transportation. Ultimately, power levels of 10 Watt proved to be achievable from a 1 m long system tube of 10 cm radius.

Keywords: thermoelectric generator, ratchet potential, Brownian ratchet, energy harvesting, sustainable energy, green technology

Procedia PDF Downloads 43
11620 Adaptive Online Object Tracking via Positive and Negative Models Matching

Authors: Shaomei Li, Yawen Wang, Chao Gao

Abstract:

To improve tracking drift which often occurs in adaptive tracking, an algorithm based on the fusion of tracking and detection is proposed in this paper. Firstly, object tracking is posed as a binary classification problem and is modeled by partial least squares (PLS) analysis. Secondly, tracking object frame by frame via particle filtering. Thirdly, validating the tracking reliability based on both positive and negative models matching. Finally, relocating the object based on SIFT features matching and voting when drift occurs. Object appearance model is updated at the same time. The algorithm cannot only sense tracking drift but also relocate the object whenever needed. Experimental results demonstrate that this algorithm outperforms state-of-the-art algorithms on many challenging sequences.

Keywords: object tracking, tracking drift, partial least squares analysis, positive and negative models matching

Procedia PDF Downloads 494
11619 Evaluation of Bacterial Composition of the Aerosol of Selected Abattoirs in Akure, South Western Nigeria

Authors: Funmilola O. Omoya, Joseph O. Obameso, Titus A. Olukibiti

Abstract:

This study was carried out to reveal the bacterial composition of aerosol in the studied abattoirs. Bacteria isolated were characterized according to microbiological standards. Factors such as temperature and distance were considered as variable in this study. The isolation was carried out at different temperatures such as 27oC, 31oC and 29oC and at various distances of 100meters and 200meters away from the slaughter sites. Result obtained showed that strains of Staphylococcus aureus, Escherichia coli, Bacillus subtilis, Lactobacillus alimentarius and Micrococcus sp. were identified. The total viable counts showed that more microorganisms were present in the morning while the least viable count of 388 cfu was recorded in the evening period of this study. This study also showed that more microbial loads were recorded the further the distance is to the slaughter site. Conclusively, the array of bacteria isolated suggests that abattoir sites may be a potential source of pathogenic organisms to commuters if located within residential environment.

Keywords: abattoir, aerosol, bacterial composition, environment

Procedia PDF Downloads 222
11618 University Students’ Perceptions of the Influence of Cannabis Use on Mental Health

Authors: Konesh Navsaria, Itumeleng Ramodumo

Abstract:

The study explored university students’ perceptions of cannabis use on academic life at a higher education institution (HEI) in Nelson Mandela Bay, South Africa. Cannabis is described as the most commonly-used drug by youth, especially those who are in tertiary institutions. The use of cannabis has both negative and positive effects; this is evident in different areas of human functioning. Cannabis usage has been debated upon in courts regarding its legalization and decriminalization, and on the 18th of September 2018, the South African High Court decriminalized cannabis for personal use. Cannabis use has increased in academic settings, and this has raised concerns about how it affects the mental health of students. A qualitative approach was used for the study with an explorative, descriptive design. Purposive sampling was used to select 15 participants for the study. Data were collected using focused-group interviews, following ethical clearance from the HEI. The collected data were analyzed and interpreted using thematic analysis, and cognitive behavioural theory was used as the theoretical framework. The research findings indicated both positive and negative influences of cannabis use on mental health. Most participants who expressed positive effects have used cannabis before, whereas most participants with negative perspectives of cannabis use on mental health are non-cannabis users. The findings revealed that participants perceived that the quantity of cannabis smoked determined whether there was a positive or negative effect on mental health; that is, large doses of cannabis were perceived as having negative effects. The research findings also revealed that the legalization of cannabis is very likely to increase its use and also highlighted precautionary measures users take to avoid the substance’s negative effects on mental health.

Keywords: cannabis use, mental health, university students, legalization

Procedia PDF Downloads 120
11617 A Critical Genre Analysis of Negative Parts in CSR Reports

Authors: Shuai Liu

Abstract:

In corporate social responsibility (CSR) reporting, companies are expected to present both the positive and negative parts of the social and environmental impacts of their performance. This study investigates how the companies that listed in fortune 500 respond to this challenge by analyzing the representations of negative part especially the safety performance. It has found that in the level of genre analysis, it presented 3 major moves and 11 steps in terms of the interdiscursivity analysis. It was made up of three dominant discourse.. The study calls for greater focus on the internal and external analysis of the negative aspect of aspects of companies’ self-disclosure.

Keywords: CSR reports, negative parts, critical genre analysis, interdiscursivity

Procedia PDF Downloads 380
11616 A Two Level Load Balancing Approach for Cloud Environment

Authors: Anurag Jain, Rajneesh Kumar

Abstract:

Cloud computing is the outcome of rapid growth of internet. Due to elastic nature of cloud computing and unpredictable behavior of user, load balancing is the major issue in cloud computing paradigm. An efficient load balancing technique can improve the performance in terms of efficient resource utilization and higher customer satisfaction. Load balancing can be implemented through task scheduling, resource allocation and task migration. Various parameters to analyze the performance of load balancing approach are response time, cost, data processing time and throughput. This paper demonstrates a two level load balancer approach by combining join idle queue and join shortest queue approach. Authors have used cloud analyst simulator to test proposed two level load balancer approach. The results are analyzed and compared with the existing algorithms and as observed, proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, join idle queue, join shortest queue, load balancing, task scheduling

Procedia PDF Downloads 398
11615 Study on the Role of Positive Emotions in Developmental Psychology

Authors: Hee Soo Kim, Ha Young Kyung

Abstract:

This paper examines the role of positive emotions in human psychology. By understanding Fredrickson and Lyubomirsky et al.’s on positive emotions, one can better understand people’s intuitive understanding, mental health and well-being. Fredrickson asserts that positive emotions create positive affects and personal resources, and Lyubomirsky et al. relate such positive resources to the creation of happiness and personal development. This paper finds that positive emotions play a significant role in the learning process, and they are instrumental in creating a long-lasting repertoire of personal resources and play an essential role in the development of the intuitive understanding of life variables, resilience in coping with life challenges, and ability to build more successful lives.

Keywords: Positive emotions, positive affects, personal resources, negative emotions, development

Procedia PDF Downloads 274
11614 Building a Scalable Telemetry Based Multiclass Predictive Maintenance Model in R

Authors: Jaya Mathew

Abstract:

Many organizations are faced with the challenge of how to analyze and build Machine Learning models using their sensitive telemetry data. In this paper, we discuss how users can leverage the power of R without having to move their big data around as well as a cloud based solution for organizations willing to host their data in the cloud. By using ScaleR technology to benefit from parallelization and remote computing or R Services on premise or in the cloud, users can leverage the power of R at scale without having to move their data around.

Keywords: predictive maintenance, machine learning, big data, cloud based, on premise solution, R

Procedia PDF Downloads 350
11613 Cloud Computing in Data Mining: A Technical Survey

Authors: Ghaemi Reza, Abdollahi Hamid, Dashti Elham

Abstract:

Cloud computing poses a diversity of challenges in data mining operation arising out of the dynamic structure of data distribution as against the use of typical database scenarios in conventional architecture. Due to immense number of users seeking data on daily basis, there is a serious security concerns to cloud providers as well as data providers who put their data on the cloud computing environment. Big data analytics use compute intensive data mining algorithms (Hidden markov, MapReduce parallel programming, Mahot Project, Hadoop distributed file system, K-Means and KMediod, Apriori) that require efficient high performance processors to produce timely results. Data mining algorithms to solve or optimize the model parameters. The challenges that operation has to encounter is the successful transactions to be established with the existing virtual machine environment and the databases to be kept under the control. Several factors have led to the distributed data mining from normal or centralized mining. The approach is as a SaaS which uses multi-agent systems for implementing the different tasks of system. There are still some problems of data mining based on cloud computing, including design and selection of data mining algorithms.

Keywords: cloud computing, data mining, computing models, cloud services

Procedia PDF Downloads 447
11612 Theorizing Income Inequality in the Face of Financial Globalization

Authors: Li Sheng

Abstract:

Based on an extended post-Keynesian model, we find that the association between the savings rate and income inequality is negative if savers’ funds are borrowed by spending households for consumption but positive if savings are channeled to investing firms for production. A negative association, such as the one that exists in the U.S., hinges on an income illusion created by an asset bubble and cheap credit. Thus, financial globalization leads consumption and income inequality to diverge, and the divergence is more extreme if lower-income groups have higher debt ratios. A positive association, such as the one that exists in China, relates to liquidity constraints faced by consumers such that consumption inequality closely follows income inequality. Our results imply that income inequality must be reduced in both types of countries to increase savings in deficit economies with negative associations and to reduce savings in surplus economies with positive associations.

Keywords: savings rate, income inequality, financial globalization, global imbalances

Procedia PDF Downloads 444
11611 Evidence of a Negativity Bias in the Keywords of Scientific Papers

Authors: Kseniia Zviagintseva, Brett Buttliere

Abstract:

Science is fundamentally a problem-solving enterprise, and scientists pay more attention to the negative things, that cause them dissonance and negative affective state of uncertainty or contradiction. While this is agreed upon by philosophers of science, there are few empirical demonstrations. Here we examine the keywords from those papers published by PLoS in 2014 and show with several sentiment analyzers that negative keywords are studied more than positive keywords. Our dataset is the 927,406 keywords of 32,870 scientific articles in all fields published in 2014 by the journal PLOS ONE (collected from Altmetric.com). Counting how often the 47,415 unique keywords are used, we can examine whether those negative topics are studied more than positive. In order to find the sentiment of the keywords, we utilized two sentiment analysis tools, Hu and Liu (2004) and SentiStrength (2014). The results below are for Hu and Liu as these are the less convincing results. The average keyword was utilized 19.56 times, with half of the keywords being utilized only 1 time and the maximum number of uses being 18,589 times. The keywords identified as negative were utilized 37.39 times, on average, with the positive keywords being utilized 14.72 times and the neutral keywords - 19.29, on average. This difference is only marginally significant, with an F value of 2.82, with a p of .05, but one must keep in mind that more than half of the keywords are utilized only 1 time, artificially increasing the variance and driving the effect size down. To examine more closely, we looked at those top 25 most utilized keywords that have a sentiment. Among the top 25, there are only two positive words, ‘care’ and ‘dynamics’, in position numbers 5 and 13 respectively, with all the rest being identified as negative. ‘Diseases’ is the most studied keyword with 8,790 uses, with ‘cancer’ and ‘infectious’ being the second and fourth most utilized sentiment-laden keywords. The sentiment analysis is not perfect though, as the words ‘diseases’ and ‘disease’ are split by taking 1st and 3rd positions. Combining them, they remain as the most common sentiment-laden keyword, being utilized 13,236 times. More than just splitting the words, the sentiment analyzer logs ‘regression’ and ‘rat’ as negative, and these should probably be considered false positives. Despite these potential problems, the effect is apparent, as even the positive keywords like ‘care’ could or should be considered negative, since this word is most commonly utilized as a part of ‘health care’, ‘critical care’ or ‘quality of care’ and generally associated with how to improve it. All in all, the results suggest that negative concepts are studied more, also providing support for the notion that science is most generally a problem-solving enterprise. The results also provide evidence that negativity and contradiction are related to greater productivity and positive outcomes.

Keywords: bibliometrics, keywords analysis, negativity bias, positive and negative words, scientific papers, scientometrics

Procedia PDF Downloads 159